Access over 35 million academic & study documents

Questions

Content type
User Generated
Subject
Cyber Security
School
Texas A & M International University
Type
Homework
Rating
Showing Page:
1/5
Part I (30 Points)
Questions are multiple choice and fill-in. Select the best answer by circling the best
multiple choice answer. Fill-in is a short response. Each question is worth 3 points
unless indicated otherwise.
1. Recently, there was an outbreak of a computer virus, known as the Melissa
virus. The FBI is determining whether the virus meets the requirements in the
criminal code for an investigation. Which legal justification should be used by the
FBI to pursue this matter?
a. Creation of computer viruses are illegal.
b. Approval from Microsoft was not granted using Microsoft's Outlook
program to spread the virus.
c. The transmission of a program, information, code, or command that
intentionally causes damage without authorization, to a protected computer.
2. As a systems administrator, where can you go, On-Line, to obtain solutions
to computer viruses.
a. Federal Bureau of Investigation (FBI)
b. National Security Agency
c. Carnegie Mellon's Computer Emergency Response Team (CERT)
d. John's Hopkins Applied Physics Laboratory
3. The Electronic Communications Privacy Act includes all of the following
statements except:
a. Forbids trespass by all persons and businesses, not just government, where
they "obtain or alter data, or prevent authorized access
b. Requires intent to defraud
c. Does not require a specified minimum dollar value of damages
d. Up to one year in prison and US$ 250K fines if for personal or
commercial gain
4. In 1992, Federal law enforcement agents arrested five members of a hacker
group. They were charged with breaking into the personnel department's computer
system and changing some evaluations. What was the computer security threat in
this scenario?
a. Fraud
b. Data Modification
c. Theft
5. List 6 of the 8 security Incident Response steps and explain why they are
necessary. (This question is worth 6 points)
The steps include:

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/5
i. Preparation it helps to plan on how to handle and prevent different security
incidents
ii. Detection and analysis used for looking for any sign related to incidents and
how to prioritize them.
iii. Containment, eradication, and recovery help develop a containment plan,
determine and mitigate the host systems that are under attack, and develop a
recovery plan.
iv. Assess the damage and severity -focuses on looking at the cause and its effects
v. Begin the process of notification notify the public on issues such as data
breaches.
vi. Start the process of prevention of the same type of incident in future help to
prevent the occurrence of such incidents in future,
vii. Post-incident activity focuses on understanding the lessons that are learned and
have a retention plan.
6. List 3 signs of a security incident and explain why these are a security
concern.
The signs of a security incident include:
i. Computer system intrusion is a form of attack in an organization to extract
meaningful information from the computer system.
ii. Unauthorized access to the system these are individuals who cannot access
different information in an organization; hence, they are security issues.
iii. Compromised user accounts these are accounts that have been attacked.
7. The article "Outbreak" emphasizes which aspect of Information Security?
a. Legal Issues
b. Risk Management
c. Response and Recovery
d. Access Control
8. Identify three FISMA security controls that can be used to mitigate a threat
for a wireless network.
i. Access control
ii. Audit and Accountability
iii. Contingency planning
9. Select three wireless protocols that provide strong authentication and/or
access control.
i. WPA2
ii. WPA
iii. WEP
Part II (70 Points)

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/5

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 5 pages?
Access Now
Unformatted Attachment Preview
Part I – (30 Points) Questions are multiple choice and fill-in. Select the best answer by circling the best multiple choice answer. Fill-in is a short response. Each question is worth 3 points unless indicated otherwise. 1. Recently, there was an outbreak of a computer virus, known as the Melissa virus. The FBI is determining whether the virus meets the requirements in the criminal code for an investigation. Which legal justification should be used by the FBI to pursue this matter? a. Creation of computer viruses are illegal. b. Approval from Microsoft was not granted using Microsoft's Outlook program to spread the virus. c. The transmission of a program, information, code, or command that intentionally causes damage without authorization, to a protected computer. 2. As a systems administrator, where can you go, On-Line, to obtain solutions to computer viruses. a. Federal Bureau of Investigation (FBI) b. National Security Agency c. Carnegie Mellon's Computer Emergency Response Team (CERT) d. John's Hopkins Applied Physics Laboratory 3. The Electronic Communications Privacy Act includes all of the following statements except: a. Forbids trespass by all persons and businesses, not just government, where they "obtain or alter data, or prevent authorized access b. Requires intent to defraud c. Does not require a specified minimum dollar value of damages d. Up to one year in prison and US$ 250K fines if for personal or commercial gain 4. In 1992, Federal law enforcement agents ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Just what I needed. Studypool is a lifesaver!

Studypool
4.7
Indeed
4.5
Sitejabber
4.4